Hi [[ session.user.profile.firstName ]]

BIG-IP Access Policy Manager Best Practices

As COVID-19 rolls across the globe, many organizations including F5, are executing business continuity plans to keep our workforce and communities safe while also keeping our employees productive to fulfill customer and partner obligations. As we endure and adapt to our new normal, you may be asking yourself how to remain operational and secure while most of your workforce is working from home.

F5 has been providing industry-leading secure remote access solutions to our customers for years and have developed best practices to meet the needs of a variety of customers. Whether you need to quickly scale or better source your remote access solution or accelerate your zero trust application access plans, F5 can help.

In this webinar, you will learn about:

- VPN Remote Access deployment best practices
- How to deploy zero-trust application access with Identity Aware Proxy
- Addressing security-related concerns including user device posture and multi-factor authentication (MFA)
- Protecting Applications and Credential Security strategies
Recorded May 6 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Corey Marshall, Director and Sr. Security Solutions Architect,F5 Networks | Chas Lesley, Sr. System Engineer, F5 Networks
Presentation preview: BIG-IP Access Policy Manager Best Practices

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • DEMO: End-to-end, multi-platform application health & insights with F5 Beacon Jun 23 2020 6:00 pm UTC 13 mins
    Hitesh Patel, Sr. Director Product Management, F5
    Learn how F5 Beacon enables a single view of your application landscape enabling multi-platform application-centric health and performance monitoring.  With Beacon users can fuse data from disparate sources and gain insights that drive better user experience and simplify anomaly detection, root cause and impact analysis.
  • DEMO:Bridge the divide with your apps and ops teams with NGINX Controller Jun 18 2020 6:00 pm UTC 8 mins
    Ken Bocchino, Director Product Marketing, F5
    Fewer headaches, faster deployments. Learn how NGINX Controller easily empowers NetOps, DevOps, and modern app teams who self‑service. See how we manage NGINX Plus with an Application Centric, API‑driven platform that integrates easily into service catalogs and CI/CD workflows.
  • DEMO: Introducing F5’s first SaaS-based Web Application Protection solution Jun 17 2020 6:00 pm UTC 10 mins
    Mark Campbell, Application Security, F5
    Demo: Essential App Protect is F5’s first SaaS-based application security solution specifically designed for app devs and DevOps teams that own the security for their apps but don’t have the security expertise necessary for essential security protections. Learn how this new developer-friendly solution can be deployed in minutes and provide rapid, out-of-the box protection for your web applications.
  • DEMO:Stop Fraud & Abuse with Advanced Artificial Intelligence & Machine Learning Jun 16 2020 6:00 pm UTC 5 mins
    Brian Uffelman, Sr Manager Product Marketing, Shape Security, a F5 Company
    DEMO: Shape Security offers the leading solution for the world’s largest companies to prevent fraud and financial abuse. See how the combined capabilities of Shape Security and F5 can help defend every app from attacks, fraud, and abuse in a multi-cloud world.
  • DEMO: Delivering Zero Trust App Access and Encrypted Threat Protection Jun 11 2020 6:00 pm UTC 12 mins
    Jay Kelley, Principal Product Marketing, F5
    Demo: BIG-IP APM in concert with F5 SSL Orchestrator protects against encrypted threats, ensuring application and infrastructure security for the remote access workforce. BIG-IP APM also enables Zero Trust Application Access, a driver for Zero Trust Architecture, through its Identity Aware Proxy capabilities, delivering a different, more secure and holistic remote access experience. Learn more in these demonstrations.
  • How to Automate NGINX and BIG IP Technologies Jun 10 2020 6:00 pm UTC 18 mins
    Ken Bocchino, Director Product Marketing, F5 | Florence Dulla, Product Marketing, F5
    NGINX and BIG IP Automation Toolchain can help you overcome your toughest digital transformation challenges, including managing large, complex deployments.  Join us to learn how our app-centric delivery model helps unleash developer productivity and accelerate innovation velocity.  We’ll discuss how you can quickly incorporate consistent and repeatable configurations and policies by integrating our technologies into your CI/CD toolchain using beloved ecosystem tools, like Ansible.
  • Magecart & Other Application Code Attacks: Digital Skimming, Fraud,and PII Theft Jun 9 2020 6:00 pm UTC 25 mins
    Wesley Hales, Business Development, F5
    Magecart and other malicious JavaScript attacks have defeated CDNs, WAFs, and many other security measures because of how and when they execute their code. These breaches have occurred at everything from small e-commerce sites to some of the biggest brands in the world. In this session, find out about the top five ways Magecart attacks are executed, how to assess your current threat surface level, and how to protect your apps.

    Register Today
  • Grow Revenue with Managed Service Offerings for App Performance & Security Jun 4 2020 6:00 pm UTC 21 mins
    Mariana Agache, VP Managed Services, F5
    Applications are your enterprise customers’ capital. F5 can help you bring new managed services to market that allow you to help your enterprise customers ensure the performance and security of their applications no matter where they run—in the cloud, in their private data centers, or on premises in the enterprise. In this session, you will learn how to offer an Advanced WAF managed service for increased application security as well as other services you can offer to differentiate and grow revenue. We’ll also introduce the new Managed Service Program, which can help you accelerate your time to market for new services and grow revenue.

    Register Today
  • Introducing F5's first SaaS-based Web Application Protection Solution Jun 3 2020 6:00 pm UTC 16 mins
    Mark Campbell, Application Security, F5
    The F5 DNS Cloud Service offers an expertly architected, globally distributed, anycast front-ended DNS architecture with built-in DDoS protection.

    In this session we’ll show you how you can quickly and easily subscribe to the service and migrate your DNS service to the cloud with just a few clicks. Roll out F5 DNS Cloud Service in minutes. Pay for what you use, scale on demand.
  • Integrating F5 Application Security into the CI/CD Pipeline Jun 2 2020 6:00 pm UTC 14 mins
    Mark Campbell, Application Security, F5
    SecOps and DevOps don’t often share the same objectives. However, sacrificing one team’s objectives to address the needs of the other just isn’t practical.

    In this session we will discuss how you can integrate F5's leading application protection solutions into Agile development environments so that security can “shift left” as a component of the automated CI/CD pipeline.
  • Deploying Production Applications from Kubernetes –the Good,the Bad and the Ugly Recorded: May 28 2020 26 mins
    Nicolas Menant, Director Product Mgmt, F5 | Owen Garrett, Sr. Director Product Mgmt, F5
    Kubernetes-based applications need help too, and it’s hard to deliver the performance and SLA that your users are accustomed to. 

    In this session, we’ll cover the critical application services needed to support your production applications, and how to provide these from a Kubernetes-centric platform. We’ll share a methodology you can use to determine the most appropriate way to host the services you need, with validated designs for WAF and API management, and we’ll briefly look forwards to future integrations and innovations from F5 and NGINX
  • How to Maintain Governance, Mitigate Risk and Manage Compliance Recorded: May 27 2020 60 mins
    Byron McNaught and Kevin Stewart
    Today, 86% of all web page loads are encrypted to protect sensitive data. But sophisticated cyber criminals also are using modern encryption to hide threats and evade detection.

    This is a challenge for financial institutions that are entrusted with safeguarding the personal data of millions of customers. Protecting this high-value data while preserving the customer experience across multiple channels, devices and touchpoints is made more complex due to encrypted threats and user privacy regulations.

    Security inspection tools are not designed to handle the demands of modern TLS encryption at scale. How well you protect your customers’ high-profile data and maintain governance, mitigate risk, and manage compliance across your financial services apps will determine your viability in the encrypted era.

    Join this webinar and discover how to:

    - Orchestrate inbound and outbound encrypted traffic without hindering performance and align with business and regulatory requirements.

    - Enhance privacy and security with operational efficiencies that maximize the ROI of existing security inspection investments.

    - Lower total cost of ownership, eliminate security blind spots, and comply with privacy regulations while meeting performance demands.

    Register Today
  • Credential Stuffing 2020: The Latest Attack Trends and Tools Recorded: May 26 2020 26 mins
    Jarrod Overson, Director of Engineering, Shape Product Group, F5
    Every day, security professionals play a cat-and-mouse game with attackers trying to make an illicit profit at your company’s or your customers’ expense. Understanding where we have come from can give you clues and ideas about what attackers will do next and how to be one step ahead of the pack. In this session, trace the evolution and economics of credential stuffing—and learn how to make yourself a hard target that is just not worth the effort.
  • Managing F5 deployments in Azure with HashiCorp Terraform Cloud Recorded: May 13 2020 53 mins
    Mark Menger, DevOps Architect, F5 Networks | Justin Linn, Solutions Engineer, HashiCorp
    The rate at which new applications are being deployed is continuing to increase, with organizations often employing 10 or more application services to power them. This drives the need for organizational visibility and enhanced collaboration among network, security, ops teams, and even developers to build and roll out applications securely and at speed.
    To deploy platform independent application services—that scale on demand without hindering deployment speeds—organizations need to implement a consistent way to both provision critical infrastructure and manage critical services while adhering to organizational policies. This is where F5 and HashiCorp comes in.

    In this webinar, we’ll cover:

    - Managing and versioning F5 configurations in Terraform Cloud
    - Leveraging HashiCorp Sentinel policies for compliance and governance
    - Deploying and configuring F5 in Azure

    Register Today
  • 2020 State of Application Report – Trends Shaping the Application Landscape Recorded: May 8 2020 48 mins
    Lori MacVittie, Principal Technical Evangelist, F5 Networks | Cindy Borovick, Business Intelligence Director, F5 Networks
    Applications power our digital economy. Through what is broadly referred to as digital transformation, businesses across all industries are becoming app-centric with the goal of moving faster, boosting efficiency, and securely delivering amazing digital experiences to not only customers and employees alike.

    But without powerful application services behind the scenes, your apps are like cars without fuel.

    In this webinar, we’ll cover:

    - How to use your own digital transformation to gain actionable business insights that prevent loss, predict capacity, optimize resources, and increase revenue
    - How to gain greater visibility into your application portfolio
    - What effect the growing number of APIs is having on the application landscape
    - Who should be in charge of ensuring the availability, performance, and security of your applications
    - We recommend virtually gathering your entire team so you can listen and connect on this important topic.

    Register Now
  • OWASP Top 10: A Real-World Retrospective Recorded: May 7 2020 56 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Byron McNaught, Sr. Technical Marketing Manager, F5 Networks
    Hindsight is 2020. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web apps each year. Come learn the real-world impact of the OWASP Top 10, and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation.

    We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar, you’ll learn:

    - How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against

    - Why the OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve

    - What could change with the 2020 OWASP Top 10

    Register Today
  • BIG-IP Access Policy Manager Best Practices Recorded: May 6 2020 59 mins
    Corey Marshall, Director and Sr. Security Solutions Architect,F5 Networks | Chas Lesley, Sr. System Engineer, F5 Networks
    As COVID-19 rolls across the globe, many organizations including F5, are executing business continuity plans to keep our workforce and communities safe while also keeping our employees productive to fulfill customer and partner obligations. As we endure and adapt to our new normal, you may be asking yourself how to remain operational and secure while most of your workforce is working from home.

    F5 has been providing industry-leading secure remote access solutions to our customers for years and have developed best practices to meet the needs of a variety of customers. Whether you need to quickly scale or better source your remote access solution or accelerate your zero trust application access plans, F5 can help.

    In this webinar, you will learn about:

    - VPN Remote Access deployment best practices
    - How to deploy zero-trust application access with Identity Aware Proxy
    - Addressing security-related concerns including user device posture and multi-factor authentication (MFA)
    - Protecting Applications and Credential Security strategies
  • Principles for Deploying a Secure Cloud Architecture Recorded: Apr 15 2020 43 mins
    Tim Wagner, Principal Cloud Evangelist, F5 Networks
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. Complicating matters further, you've got regulatory compliance constraints, escalating performance expectations from customers, and ever-evolving security risks.

    The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    In this webinar, you’ll learn about:

    - Architecture design principles that support business outcomes at scale

    - How development and IT roles need to evolve to support the business

    - The importance of reusable infrastructure and security services

    Register Now
  • How to Uncover Threats Hiding in Encryption Recorded: Apr 14 2020 50 mins
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Kevin Stewart, Security Solutions Architect, F5 Networks
    With close to 90% of the Internet encrypted and 68% of malware hiding in SSL/TLS web traffic, you may never see the threats lurking in your network. Many of the security inspection tools available today either fail to decrypt that traffic or they introduce latency and complexity, reducing security and scalability.

    Any serious malware threat will try to disguise itself as legitimate SSL/TLS traffic. So how can you see what you’re missing?

    Join this webinar and discover how to:

    • Intelligently decrypt SSL/TLS traffic and orchestrate your security inspection tools.

    • Protect SaaS applications, like Office 365, from malware and other threats.

    • Centralize decryption and re-encryption to increase the lifespan of your existing security devices.
  • 5G: An Opportunity to Get Security Right Recorded: Apr 8 2020 50 mins
    Mark Campbell, Product Marketing, F5 Networks | Geoff Petersen, Product Management,F5 Networks
    What do endpoint validation, slicing, and automation have in common? All are essential components of a 5G security strategy. As preparation is underway for 5G services, providers are working to address a new set of security requirements.

    Leading providers are focused on implementing natively-designed security capabilities to cost-efficiently protect their infrastructures and subscribers.

    Join this webinar to gain F5 Networks insights on the market’s 5G security investment priorities and architecture preferences.

    We’ll review key findings from the F5 sponsored Heavy Reading 2019 5G Security Market Leadership study which details where leading providers are focusing their 5G security planning efforts.

    Join us for this webinar to learn about:

    - 5G security architecture preferences

    - Implementing security automation

    - Evolving network defenses to 5G
Think App Security First
Weather it's apps that help connect businesses to their customers or apps that help employees do their jobs - we make sure apps are always available and secure, anywhere.
Visit F5 at: https://www.f5.com/company

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: BIG-IP Access Policy Manager Best Practices
  • Live at: May 6 2020 6:00 pm
  • Presented by: Corey Marshall, Director and Sr. Security Solutions Architect,F5 Networks | Chas Lesley, Sr. System Engineer, F5 Networks
  • From:
Your email has been sent.
or close